default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2016
- Marcelo Cerqueira de Abranches, Priscila Solís:
An algorithm based on response time and traffic demands to scale containers on a Cloud Computing system. NCA 2016: 343-350 - Francois Aissaoui, Gene Cooperman, Thierry Monteil, Saïd Tazi:
Smart scene management for IoT-based constrained devices using checkpointing. NCA 2016: 170-174 - Aubrey Alston, Tamer Refaei:
Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens. NCA 2016: 85-88 - Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:
MANETs monitoring with a distributed hybrid architecture. NCA 2016: 388-391 - Marcos Amaris, Raphael Y. de Camargo, Mohamed Dyab, Alfredo Goldman, Denis Trystram:
A comparison of GPU execution time prediction using machine learning and analytical modeling. NCA 2016: 326-333 - Emmanuelle Anceaume, Thibaut Lajoie-Mazenc, Romaric Ludinard, Bruno Sericola:
Safety analysis of Bitcoin improvement proposals. NCA 2016: 318-325 - Kuldip Singh Atwal, Ajay Guleria, Mostafa A. Bassiouni:
A scalable peer-to-peer control plane architecture for Software Defined Networks. NCA 2016: 148-152 - D. R. Avresky, Mladen A. Vouk:
Message from the steering committee and general chairs. NCA 2016: xiii - Karan Balu, Miguel L. Pardal, Miguel Correia:
DARSHANA: Detecting route hijacking for communication confidentiality. NCA 2016: 52-59 - Mehdi Bentounsi, Salima Benbernou:
Secure complex monitoring event processing. NCA 2016: 392-395 - Ahmed Bouhoula, Anis Yazidi:
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations. NCA 2016: 76-80 - Daniel Caixinha, Pradeeban Kathiravelu, Luís Veiga:
ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers. NCA 2016: 140-147 - Sidartha A. L. Carvalho, Daniel C. Cunha, Abel G. Silva-Filho:
On the use of nonlinear methods for low-power CPU frequency prediction based on Android context variables. NCA 2016: 250-253 - Sidartha A. L. Carvalho, Rafael N. Lima, Daniel C. Cunha, Abel G. Silva-Filho:
A hardware and software Web-based environment for Energy Consumption analysis in mobile devices. NCA 2016: 242-245 - Ev Cheng, Kourtney Meiss, Kendall Park, John Gillis, Dave Weber, Salman Ahmad, Prasad Calyam:
Contextual geotracking service of incident markers in disaster search-and-rescue operations. NCA 2016: 22-26 - Evgenia Christoforou, Antonio Fernández Anta, Kishori M. Konwar, Nicolas C. Nicolaou:
Evaluating reliability techniques in the master-worker paradigm. NCA 2016: 183-190 - Florent Coriat, Anne Fladenmuller, Luciana Arantes, Olivier Marin:
Crowdsourcing-based architecture for post-disaster geolocation: A comparative performance evaluation. NCA 2016: 1-9 - Rudyar Cortés, Xavier Bonnaire, Olivier Marin, Luciana Arantes, Pierre Sens:
GeoTrie: A scalable architecture for location-temporal range queries over massive geotagged data sets. NCA 2016: 10-17 - Shlomi Dolev, Nisha Panwar:
Peripheral authentication for autonomous vehicles. NCA 2016: 282-285 - Sisi Duan, Yun Li, Karl N. Levitt:
Cost sensitive moving target consensus. NCA 2016: 272-281 - Sisi Duan, Lucas Nicely, Haibin Zhang:
Byzantine reliable broadcast in sparse networks. NCA 2016: 175-182 - Mohammad Reza Hoseiny Farahabady, Hamid R. Dehghani Samani, Yidan Wang, Albert Y. Zomaya, Zahir Tari:
A QoS-aware controller for Apache Storm. NCA 2016: 334-342 - Ricardo Filipe, Filipe Araújo:
Client-side monitoring techniques for web sites. NCA 2016: 363-366 - Klaus-Tycho Foerster, Demian Jaeger, David Stolz, Roger Wattenhofer:
Reducing the latency-tail of short-lived flows: Adding forward error correction in data centers. NCA 2016: 122-125 - Aris Gkoulalas-Divanis, Alessandro Pellegrini, Pierangelo di Sanzo:
Message from the program chairs. NCA 2016: xiv - Nelson Mimura Gonzalez, Tereza Cristina Melo de Brito Carvalho, Charles Christian Miers:
Multi-phase proactive cloud scheduling framework based on high level workflow and resource characterization. NCA 2016: 43-47 - Arnaldo Gouveia, Miguel Correia:
Feature set tuning in statistical learning network intrusion detection. NCA 2016: 68-75 - Rabah Guedrez, Olivier Dugeon, Samer Lahoud, Géraldine Texier:
Label encoding algorithm for MPLS Segment Routing. NCA 2016: 113-117 - Safa Hamdoun, Abderrezak Rachedi, Hamidou Tembine, Yacine Ghamri-Doudane:
Efficient transmission strategy selection algorithm for M2M communications: An evolutionary game approach. NCA 2016: 286-293 - Jiyong Han, Daeyoung Kim:
A back-end offload architecture for security of resource-constrained networks. NCA 2016: 383-387
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 08:40 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint